An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)
☆24Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for firmanal
Users that are interested in firmanal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Expected edit distance implementation using OpenFst tools☆11May 13, 2015Updated 11 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- security machine learning☆72May 15, 2017Updated 9 years ago
- ¯\_(ツ)_/¯☆29Dec 16, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 7 years ago
- ☆15Dec 22, 2015Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 7 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Frida script to bypass ssl Pinning☆45Jan 16, 2022Updated 4 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Jul 5, 2017Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Flex 'em lexers☆42Apr 22, 2026Updated last month
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- LOCAL ROOT EXPLOITS☆38Jul 30, 2018Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago